1 / 35

Diffie Hellman Key Exchange Algorithm | Cryptography And Network Security |

In this presentation on the Diffie Hellman Key Exchange Algorithm, we look at a vital cog in the area of Cryptography and Network Security in general. We will begin by learning why an efficient key exchange method was necessary and how one-way functions help us in achieving this distinction. Next, we learn about the steps needed to exchange cryptographic keys and the practical implementation of this process. Finally, we take a look at the Diffie Hellman Key Exchange algorithm.<br>

Simplilearn
Télécharger la présentation

Diffie Hellman Key Exchange Algorithm | Cryptography And Network Security |

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Henry Stella

  2. Let’s consider Henry and Stella who want to exchange messages securely using encrypted messages. Henry Stella

  3. Click here to watch the video

  4. To be able to send encrypted messages, an encryption/decryption key must be formulated. Henry Stella

  5. Sending this key directly makes it easy for hackers to capture it in transit.

  6. Sending this key directly makes it easy for hackers to capture it in transit.

  7. Sending this key directly makes it easy for hackers to capture it in transit. This is where the Diffie Hellman Key Exchange algorithm can help us in securely exchanging keys.

  8. What Is Diffie Hellman Key Exchange? • How do One-Way Functions Work? • Steps in Key Exchange • Practical Implementation • Applications of DHKE Agenda For the Day

  9. What Is Diffie Hellman Key Exchange?

  10. What Is Diffie Hellman Key Exchange? • Algorithm to securely exchange keys • Proposed in 1976 by Whitfield Diffie and Martin Hellman • Communicated over “insecure” channels • Used as a precursor to asymmetric cryptographic algorithms.

  11. How do One-Way Functions Work?

  12. Both users must have their private colors set, and must decide on a common public color to be used.

  13. The private colors and public colors are mixed together.

  14. The private colors and public colors are mixed together.

  15. The color mixture is then sent among the users.

  16. The private colors are now combined with the mixture to find the actual secret color.

  17. The private colors are now combined with the mixture to find the correct secret color.

  18. The private colors are now combined with the mixture to find the correct secret color.

  19. Since the hacker doesn’t have each user’s private color, the secret key can be used to encrypt messages safely.

  20. Steps In Key-Exchange

  21. Choose q and α a. Choose a prime number q b. Select αas a primitive root of q To be a primitive root, α mod q α2 mod q α3 mod q . . . . αq-1 mod q Step 1 < q (1,2,3,4….,q-1)

  22. Deriving the Key Pair Step 1 Assume private key = Xa where Xa < q Assume private key = Xb where Xb < q Step 2 Public key (Ya) becomes: Public key (Yb) becomes: Yb = αxb mod q Ya = αxa mod q Key pair : {Xb,Yb} Key pair : {Xa,Ya}

  23. Key Generation Step 2 Step 3 Parameters : Xb, Ya, q Parameters : Xa, Yb, q Step 1 Secret Key generated: Secret Key generated: K = (Ya)Xb mod q K = (Yb)Xa mod q

  24. Key Generation Step 2 Step 3 Parameters : Xa, Yb, q Parameters : Xb, Ya, q Step 1 Secret Key generated: Secret Key generated: = (Yb)Xa mod q (Ya)Xb mod q

  25. Practical Implementation

  26. Choose q and α a. Choose a prime number q = 17 b. Select αas a primitive root of q, where α = 3 To be a primitive root, 3 mod 17 = 3 32 mod 17 = 9 33 mod 17 = 10 . . . . 316 mod 17 = 1 Step 1 < 17

  27. Deriving the Key Pair Step 1 Assume private key = Xa where Xa = 15 Assume private key = Xb where Xb = 13 Step 2 Public key (Ya) becomes: Public key (Yb) becomes: Yb = 313 mod 17 = 12 Ya = 315 mod 17 = 6 Key pair : {13,12} Key pair : {15,6}

  28. Key Generation Step 2 Step 3 Parameters : Xa, Yb, q Parameters : Xb, Ya, q Step 1 Secret Key generated: Secret Key generated: K = 1215 mod 17= 10 K = 613 mod 17= 10

  29. Applications of DHKE

  30. Applications of DHKE Public Key Infrastructure

  31. Applications of DHKE SSL/TLS Handshake

  32. Applications of DHKE Secure Shell Access (SSH)

More Related